Security Advisories (2)
CVE-2022-23935 (2022-01-25)

lib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a $file =~ /\|$/ check, leading to command injection.

CVE-2021-22204 (2021-04-23)

Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image

NAME

Image::ExifTool::PLIST - Read Apple PLIST information

SYNOPSIS

This module is used by Image::ExifTool

DESCRIPTION

This module contains the routines used by Image::ExifTool to extract information from Apple Property List files.

NOTES

This module decodes both the binary and XML-based PLIST format.

AUTHOR

Copyright 2003-2014, Phil Harvey (phil at owl.phy.queensu.ca)

This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself.

REFERENCES

http://www.apple.com/DTDs/PropertyList-1.0.dtd
http://opensource.apple.com/source/CF/CF-550/CFBinaryPList.c

SEE ALSO

"PLIST Tags" in Image::ExifTool::TagNames, Image::ExifTool(3pm)